IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
137
A Fuzzy Logic-Based Clustering Algorithm for WSN to Extend the Network Lifetime Padmalaya Nayak, Member, IEEE, and Anurag Devulapalli
Abstract— Wireless sensor network (WSN) brings a new paradigm of real-time embedded systems with limited computation, communication, memory, and energy resources that are being used for huge range of applications where the traditional infrastructure-based network is mostly infeasible. The sensor nodes are densely deployed in a hostile environment to monitor, detect, and analyze the physical phenomenon and consume considerable amount of energy while transmitting the information. It is impractical and sometimes impossible to replace the battery and to maintain longer network life time. So, there is a limitation on the lifetime of the battery power and energy conservation is a challenging issue. Appropriate cluster head (CH) election is one such issue, which can reduce the energy consumption dramatically. Low energy adaptive clustering hierarchy (LEACH) is the most famous hierarchical routing protocol, where the CH is elected in rotation basis based on a probabilistic threshold value and only CHs are allowed to send the information to the base station (BS). But in this approach, a super-CH (SCH) is elected among the CHs who can only send the information to the mobile BS by choosing suitable fuzzy descriptors, such as remaining battery power, mobility of BS, and centrality of the clusters. Fuzzy inference engine (Mamdani’s rule) is used to elect the chance to be the SCH. The results have been derived from NS-2 simulator and show that the proposed protocol performs better than the LEACH protocol in terms of the first node dies, half node alive, better stability, and better lifetime. Index Terms— WSN, SCH, fuzzy logic.
I. I NTRODUCTION
W
IRELESS Sensor Network considered as real time embedded system deployed in a particular region to sense various types of environmental parameters such as temperature, pressure, gas, humidity etc. The huge applications of WSN like habitant monitoring, forest fire detection, surveillances, transport monitoring etc. have created a lot of interest among the researcher community in recent past. Typically, WSNs are densely deployed in hazardous places where battery recharge or replacement is nearly impossible and human monitoring scheme is highly risky. There are many typical issues such as power constraints, limited computing capacity, open environment; radio Manuscript received July 20, 2015; revised August 13, 2015; accepted August 13, 2015. Date of publication August 25, 2015; date of current version December 10, 2015. The associate editor coordinating the review of this paper and approving it for publication was Dr. M. N. Abedin. P. Nayak is with the Department of Information Technology, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad 500090, India (e-mail:
[email protected]). A. Devulapalli was with the Department of Information Technology, Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad 500090, India. He is now with the System Testing Department, TCS, Mumbai 400 614, India (e-mail:
[email protected]). Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/JSEN.2015.2472970
Fig. 1.
General System Model for clustered WSN.
connectivity makes the sensor nodes faulty many times. Once the network is established, nodes keep on sensing the information and the battery power goes exponentially. Whenever the nodes detect any event, they send the information to the other nodes or to the base station. Sometimes it happens that the same information received by nearby sensor nodes can be received by the base station that makes the network inefficient. To avoid this data redundancy and to make the network most energy efficient, data aggregation and sensor fusion have been emphasized in the literature [1]. Many routing protocols with many different ideas have been proposed in the literature to make the network energy efficient [14]. Cluster based routing protocol is one of these efficient ideas, where sensor nodes are divided into number of groups and each group is called as a cluster. One group leader is elected in each cluster known as Cluster Head (CH). Data aggregation is obtained at the leader node. The leader node/CH is only responsible for sending the message to the BS. Figure 1 shows the general system model for clustering based WSN. LEACH [1], [2] is the first famous hierarchical routing protocol which is proven to be most efficient over traditional routing protocol. In LEACH, the CH is elected in a probabilistic manner and tries to balance the load at each sensor node in a rotation basis. Even though many studies present the efficiency of LEACH protocol, it has certain pitfalls that need to be discussed. As LEACH relies on probabilistic value, it might happen that in each round more than one cluster heads are elected or no cluster head is elected. Further, the
1530-437X © 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
138
IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
cluster head may be elected at the boundary of the network which leads to the improper energy distribution. LEACH also does not consider the distribution of sensor nodes and remaining energy of each node after completion of each round. LEACH-C is another routing protocol [2] follows a centralized approach to elect the CH by using BS and location information of each sensor node. By doing so, it produces better number of clusters and distributes the CHs evenly among the clusters. At the same time it increases the network overhead since all the sensor nodes are required to send their location information to BS at a time in every set-up phase. In the proposed model, attempt has been made to improve the performance of LEACH protocol in view of electing an appropriate Super Cluster Head (SCH) among the CHs by applying suitable fuzzy descriptors. Only SCH is allowed to send the message to the BS by reducing the number of message retransmissions performed by the CHs. The following sections discuss the protocol in detail. The rest of the paper is organized as follows. Section II presents an overview of the related work in this area. Section III discuses about the Radio Model. Section IV presents the Fuzzy Inference Modules and the proposed algorithm. Results and discussions are provided in Section V. Section VI indicates the future research followed by the conclusive remark. II. R ELATED W ORK In this section, most of the well-known hierarchical routing protocols are discussed where the cluster heads are elected in an energy efficient manner. We have also focused on some fuzzy logic based clustering protocols. Each cluster head is the representative for the respective cluster for gathering the information from other nodes and send to the base station either directly or indirectly. Even though many clustering protocols with fuzzy or without fuzzy descriptors are proposed, very few most important protocols are presented here. A. Hierarchical Routing Protocols Based on Clustering 1) LEACH: LEACH [1], [2] is a hierarchical routing protocol which elects CHs based on probabilistic model and each sensor node has equal chance to become a CH. This protocol operates in two phases. These are set up phase and steady state phase. In set up phase, nodes form the cluster and actual data is transmitted in the steady state phase. Each node chooses a random number between 0 and 1 to become the CH. If the number is less than the threshold value T (n), the node gets the chance to be the cluster head for the current round. The threshold value T (n) is defined in equation (1). , i f n ∈ G p 1− p∗ rmod 1p (1) T (n) = 0, other wi se r is the round which already ended, p is the probability of the nodes to be the CH, G is a set of nodes which have never been cluster head in the last 1/p rounds. Although LEACH protocol distributes the load equally on each cluster head, still there are some pitfalls that need to be addressed.
These are: There is no guarantee that preferred number of CHs is elected in each round. • LEACH uses probabilistic model to decide Cluster Head. So there is a possibility that two cluster heads are elected which is closed to each other, that tends to deplete over all energy in the network. • More CPU cycles are consumed because in each round, one random number is generated and threshold value is calculated. • If the elected node is located near to the boundary of the network, other nodes could dissipate more energy to transfer the message to CH. 2) LEACH–C: In LEACH-C [2] CH is elected by the BS using a centralized algorithm. BS knows the location information and energy of each node. So, it can produce better clusters by dispersing Cluster Head nodes throughout the network. The main drawback of this centralized protocol is that the position of all the nodes must be known. In [3]–[8], many clustering protocols have been discussed. As we are interested on fuzzy logic based clustering protocols, few of them are highlighted below. •
B. Fuzzy Logic Based Clustering Protocol Many researchers have come up with many different ideas how Fuzzy Logic (FL) can be utilized to elect the proper and efficient CH so that substantial life time can be accomplished. Some of the well-known FL based clustering algorithms have been discussed below. 1) CHEF: In CHEF [4] CH is elected based on two parameters which are proximity distance and energy. The fuzzy based approach elects the node to be the CH with high energy and locally optimal node. Simulation result shows that the CHEF is 22.7% more efficient than LEACH. In [3], the author has considered three fuzzy parameters such as energy, concentration, and centrality. These three parameters are the key points to calculate the chance to be the CH which can improve the network life time. Energy level is defined as available energy at each node, concentration is number of neighbor nodes and centrality is a value based on how central the node to the cluster. But the main drawbacks with this protocol are that all the nodes are not equipped with GPS receivers and they might not be able to provide location information in some places. 2) F-MCHEL: In F-MCHEL [7] CH is elected by applying fuzzy rules based on energy and proximity of distance. The node which has the maximum residual energy among the cluster heads is elected as a Master Cluster Head (MCH) and sends the aggregated data to the base station. F-MCHEL is an improvement of CHEF. It provides more network stability as compared to LEACH and CHEF. In F-MCHEL, base station has been considered as static. In [9]–[12] many protocols have been discussed based on fuzzy techniques. In [15], we proposed a protocol which considers three fuzzy parameters such as remaining battery power, mobility, and distance to base station to elect a SCH. but the major drawbacks of this protocol is that when mobility increases or decreases, the lifetime of
NAYAK AND DEVULAPALLI: FUZZY LOGIC-BASED CLUSTERING ALGORITHM FOR WSN
139
probabilistic model. FL is adopted in this technique in order to handle the uncertainties for electing the SCH. The major benefit of using FL is to overcome the overheads of collecting and calculating energy and location information of each node. Most of the FL based clustering algorithms consider the sink node/BS as static. Now there is a trend to investigate sink or BS mobility that can relieve the network traffic, reduces delay and enhances energy efficiency [16]. Finally, through the simulation results it has been shown that the proposed approach performs better than LEACH protocol. A. System Assumption Fig. 2.
Radio Model.
the network remains constant. Because, mobility indirectly proportional to the distance to base station. To overcome this problem, Centrality has been considered as the third input parameter for the fuzzification module in this proposed protocol. From the simulation results it is believed that the proposed protocol is stable and would be applicable in large scale for WSN applications. III. E NERGY M ODEL A NALYSIS Figure 2 shows the radio model which has been referred from [6]. The amount of energy consumed from the transmitter to the receiver for l bits to a distance d during transmission and reception is given in equation 2. E T x (l, d) = E T x−elec (l) + E T x−amp (l, d) l∗E elec + l ∗ ε f s ∗ d 2 i f d < d0 ; = l∗E elec + l ∗ εmp ∗ d 4 i f d ≥ d0 ;
(2)
•
E elec represents the energy dissipated per bit to run the transmitter or the receiver circuit. It depends on the factors like digital coding, modulation, filtering and spreading of the signal. • ε f s &εmp are the characteristics of the transmitter amplifier where ε f s is used for free space and εmp for multipath. As the distance between transmitter and receiver is less than the threshold value d0 , the free space model (d2 power loss) is used. Otherwise, the multipath fading channel model (d4 power loss) is used. Power control can be used to invert this loss by appropriately adjusting the power amplifier. The equation 3 shows the amount of energy consumption to receive l bit of data while equation 4 represents the threshold value which is the ratio of ε f s &εmp . E Rx (l) = E elec ∗ l d0 = ε f s εmp
(3) (4)
IV. P ROPOSED P ROTOCOL Fuzzy Logic is used to model human experience and human decision making behavior. Further, it can handle uncertainties of real time applications more accurately than the
In the proposed model, sensor nodes are considered to be deployed randomly to monitor the environment continuously. 1) All the sensor nodes are static except the base station. 2) The base station is mobile. 3) Homogeneous networks have been considered such that all the sensor nodes have initial equal energy. 4) The distance between the node and the base station can be computed based on received signal strength. B. System Model The proposed clustering method follows the basic principle of LEACH. The cluster is formed in each round. In every clustering round, each node generates a random number between 0 and 1. If the random number for a particular node is smaller than the threshold value T, the node becomes the CH. In basic LEACH [2], the cluster formation algorithm was defined to ensure that the no. of cluster per round is k, a system parameter. The optimal value of k (k optimal) in LEACH can be determined analytically by computation and communication energy model. For instance, if there are N nodes distributed randomly over M×M region, and k clusters are assumed, then there are N/k nodes per cluster (one CH and (N/k)-1) Non Cluster head nodes. Each CH dissipates energy by receiving the signal, aggregates it and sends the average signal to BS. It is assumed that sensor nodes send the data after detecting an interesting event. CH collects these data, aggregates it and send to the base station. To save some energy, we may think of one SCH among the CHs can send the data to BS to utilize the bandwidth efficiently. Instead of multiple CHs, one SCH can deliver the message to BS that can reduce energy consumption and enhances energy efficiency. The proposed model is depicted in Figure 3. Another assumption we have made the BS mobility that can relax collision avoidance by collecting the data from SCH. Other sensor nodes including CHs and SCH remain static. Base station may adopt many different paths to collect the information from the SCH as shown in Figure 4. Further assumption we have made that Remaining battery power, Mobility, and Centrality: the three fuzzy descriptors are suitable to calculate the chance to be the SCH that can deliver the message to the BS. Assuming that in each round energy level of each CH gets reduced, remaining battery power has been considered as a metric. Centrality is considered as another major metric because centrality focuses on the location of SCH how much it is positioned centrally to communicate
140
IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
Fig. 5.
Fig. 3.
The Proposed Model.
Fig. 6.
Fig. 4.
Block diagram of Fuzzy Inference System.
Paths taken by Base Station.
with other CHs. Mobility implies that when BS moves in a particular direction, the distance between BS and SCH increases or decreases w.r.t to the speed and direction of moving BS. The Proposed Algorithm /∗ for every round ∗/ 1) Select CHs based on threshold value. 2) Select koptimal CHs in each round. 3) Select SCH based on fuzzy if-then rules from the CHs. /∗ for kopt imal CHs ∗/ 1) All CHs sends the aggregated data to SCH /∗ end of for ∗/ 1) BS collects the information from SCH /∗ end of rounds ∗/ C. Fuzzy Logic Model The Fuzzy logic model consists of four modules: a fuzzifier, fuzzy inference engine, fuzzy rules and a defuzzifier. The most widely used fuzzy method Mamdani’s Method [13] is used here. The block diagram of the Fuzzy Inference System is
Fuzzy system for the Proposed Model.
shown in Figure 5. There are four steps required to complete the process. 1) Fuzzification: In fuzzifier, inputs are given with crisp value and changed into a fuzzy set. This can be achieved by fuzzification. 2) Rule evaluation: It stores IF-THEN rule. 3) Fuzzy Inference Engine: This engine takes both the input values and IF-THEN rules to simulate the reasoning by which it produces a fuzzy inference. 4) Defuzzification: Defuzzifier transforms the fuzzy set into crisp value. 1) Fuzzification Module: In our proposed protocol, Mamdani’s Method Fuzzy Inference Technique is used to elect the SCH as it is the most frequently used inference technique. The inference techniques and the fuzzy system used for our proposed model are given in Figure 6. We have taken three fuzzy input variables to elect the tentative Super Cluster Head. All the three input variables have three membership functions each. The fuzzy set that represents the first input variable i.e. remaining battery power is depicted in Figure 7(a). The linguistic variables for the fuzzy set is less, medium and high. Trapezoidal membership function has been considered for less and high. For medium, triangular membership function has been considered. The second fuzzy input variable is the mobility of the base station because the proposed protocol considers the base station as mobile. The linguistic variables for mobility are taken as low, moderate, and frequent. The fuzzy set for mobility is depicted in Figure 7(b). The third fuzzy input variable is the centrality that how much the SCH is central to other
NAYAK AND DEVULAPALLI: FUZZY LOGIC-BASED CLUSTERING ALGORITHM FOR WSN
141
TABLE I M EMBERSHIP F UNCTIONS FOR I NPUT VARIABLES
Fig. 8.
Fuzzy set for output variable Chance. TABLE II
M EMBERSHIP F UNCTION FOR O UTPUT VARIABLES
Fig. 7. Membership Function Plots. (a) Battery Power. (b) Mobility. (c) Centrality.
which is given in equation 5. Chance = (Batter y Power − 1) + Mobili t y + Centr ali t y (5)
clusters. The linguistic variables for centrality are considered as close, adequate, and far. The fuzzy set for centrality is shown in Figure 7(c). Table 1 shows the Membership functions of all the input variables. The degree of the membership function is shown by a numerical after each membership function. 2) Rule Base and Inference Engine: In our system, we have used 27 rules in the fuzzy inference. The form of the rules is if X, Y, Z then C. X represent remaining battery power, Y represents mobility, Z represents the centrality, and C represents the chance. The rules are derived from the formula
In this equation, we have considered remaining battery power as (Battery Power – 1) because in each round there will be some energy consumption at each node. So, after processing of each round, the remaining energy is considered for the next round. Mobility and Centrality is assumed to be additive factor why because the distance of SCH from base station increases or decreases with respect to the movement of base station. When SCH delivers the message to BS how much it is central to other clusters to deliver the message. As discussed above, the output variable chance of a node for getting elected as a SCH is calculated using remaining battery power, mobility of
142
IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
TABLE III F UZZY RULES AND VALUE OF C HANCE
TABLE IV S IMULATION PARAMETERS
base station, and centrality of the clusters. The output chance is composed of 7 membership functions very weak, weak, lower medium, medium, higher medium, strong, very strong. The fuzzy set for chance is depicted in Figure 8. Table 2 shows the Membership functions for the output variable chance. The chance value to be the SCH is calculated considering three input parameters such as remaining battery power, mobility and centrality by using Fuzzy rules. The fuzzy rules and value of chance is depicted in Table 3. V. S IMULATION R ESULTS AND ANALYSIS To check the validity of the proposed protocol, NS-2 simulator (2.34) has been used as the tool to compare the performance metrics of our interest with LEACH protocol which ensures extended lifetime of the WSN for the proposed protocol. A. Experimental Set-Up In this experiment, we have considered 40 nodes randomly deployed over the area between (x=0, y=0) and (x=100,
Fig. 9.
First node dies over time.
y=100) with BS location (x=50, y=50). We assume four no. of clusters. Each round duration is 20s. The bandwidth of the channel is 1 Mbps. Each data message is 500 bytes long; packet header length is 25 bytes. We have used a simple energy
NAYAK AND DEVULAPALLI: FUZZY LOGIC-BASED CLUSTERING ALGORITHM FOR WSN
Fig. 10.
Fig. 11.
143
Half nodes alive over time.
Fig. 12.
End to end delay over time.
Network Stability period.
Fig. 13.
Network lifetime over time.
model. The communication parameters and the required parameters of interest are given in Table 4. We run the simulation for 20000s. After running the simulation extensively, it is concluded that the proposed approach performs better than LEACH which is discussed in the next section. 1) Results and Discussion: In this section, we present the experimental results obtained from the simulations to evaluate the proposed algorithm. Fig. 9 shows the time period when the first node dies. Because, the lifetime of the network depends on the lifetime of individual node. It is seen from Fig. 9 that first node dies in LEACH very fast whereas it survives almost double time in the proposed model. In [17], the author discusses a metric half of the nodes alive (HNA) that calculates the estimated value for the round in which half of the nodes die. The time duration between the death of first node and half of the nodes mostly indicates the stability period of the network. This metric is very useful when the sensor nodes are densely deployed. It is seen from Fig. 10 that half of the
nodes die first in LEACH and survives for longer period of time in the proposed protocol. So, the network is more stable between the time periods of first node death to half of the node alive. Fig. 11 proofs that the proposed protocol is more stable than the LEACH protocol. Fig. 12 presents about end to end delay. End to end delay is defined as the maximum time taken by the packets to travel from source to BS. It is evident from Fig. 12 that end to end delay is reduced by 62% in the proposed protocol compared to LEACH. Network lifetime is an important metric to estimate the network performance because the ultimate goal is to accomplish longer network lifetime while designing a protocol for WSN. To proof this, we have verified with the survival of sensor nodes w.r.t number of rounds and the time when last node dies. Fig. 13 confirms that sensor nodes survive up to more number of rounds compared to LEACH. Fig. 14 conveys that last node dies in LEACH much before than the proposed approach. It has been concluded from the simulation results (plotted
144
IEEE SENSORS JOURNAL, VOL. 16, NO. 1, JANUARY 1, 2016
Fig. 14.
Last Node dies over time.
from Fig. 9-14) that the proposed protocol using fuzzy model is more stable and have 20% longer lifetime compared to LEACH. VI. C ONCLUSION While LEACH seems to be a promising protocol, there are some areas for improvement that makes the protocol more attractive and widely applicable. In this paper, an energy efficient clustering algorithm has been proposed for Wireless Sensor Network using fuzzy logic concept. By selecting suitable fuzzy descriptors one Super Cluster Head is elected among the cluster heads who is the representative for delivering the message to a mobile base station. The idea of sink mobility along with the fuzzy logic increases the network life time dramatically. It is expected that it would be more useful in many practical applications like health care, agricultural field, disaster heat areas, military applications etc. Simulation result shows that the proposed protocol performs better than LEACH protocol in terms of first node dies, half nodes alive, last node dies, better stability and better network lifetime. R EFERENCES [1] W. R. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “Energy-efficient communication protocol for wireless microsensor networks,” in Proc. IEEE Comput. Soc. 33rd Annu. Hawaii Int. Conf. Syst. Sci. (HICSS), Jan. 2000, pp. 1–10. [2] W. B. Heinzelman, A. Chandrakasan, and H. Balakrishnan, “An application-specific protocol architecture for wireless microsensor networks,” IEEE Trans. Wireless Commun., vol. 1, no. 4, pp. 660–670, Oct. 2002. [3] I. Gupta, D. Riordan, and S. Sampalli, “Cluster-head election using fuzzy logic for wireless sensor networks,” in Proc. 3rd Annu. Commun. Netw. Services Res. Conf., May 2005, pp. 255–260. [4] J.-M. Kim, S.-H. Park, Y.-J. Han, and T.-M. Chung, “CHEF: Cluster head election mechanism using fuzzy logic in wireless sensor networks,” in Proc. 10th ICACT, Feb. 2008, pp. 654–659. [5] A. Alkesh, A. K. Singh, and N. Purohit, “A moving base station strategy using fuzzy logic for lifetime enhancement in wireless sensor network,” in Proc. Int. Conf. Commun. Syst. Netw. Technol., Jun. 2011, pp. 198–202. [6] H. Taheri, P. Neamatollahi, O. M. Younis, S. Naghibzadeh, and M. H. Yaghmaee, “An energy-aware distributed clustering protocol in wireless sensor networks using fuzzy logic,” Ad Hoc Netw., vol. 10, no. 7, pp. 1469–1481, 2012.
[7] T. Sharma and B. Kumar, “F-MCHEL: Fuzzy based master cluster head election Leach protocol in wireless sensor network,” Int. J. Comput. Sci. Telecommun., vol. 3, no. 10, pp. 8–13, Oct. 2012. [8] Z. W. Siew, C. F. Liau, A. Kiring, M. S. Arifianto, and K. T. K. Teo, “Fuzzy logic based cluster head election for wireless sensor network,” in Proc. 3rd CUTSE Int. Conf., Sarawak, Malaysia, 2011, pp. 301–306. [9] V. Nehra, R. Pal, and A. K. Sharma, “Fuzzy-based leader selection for topology controlled PEGASIS protocol for lifetime enhancement in wireless sensor network,” Int. J. Comput. Technol., vol. 4, no. 3, pp. 755–764, Mar./Apr. 2013. [10] G. Ran, H. Zhang, and S. Gong, “Improving on LEACH protocol of wireless sensor networks using fuzzy logic,” J. Inf. Comput. Sci., vol. 7, no. 3, pp. 767–775, 2010. [11] H. Ando, L. Barolli, A. Durresi, F. Xhafa, and A. Koyama, “An intelligent fuzzy-based cluster head selection system for WSNs and its performance evaluation for D3N parameter,” in Proc. Int. Conf. Broadband, Wireless Comput., Commun., Appl., Nov. 2010, pp. 648–653. [12] Z. Arabi, “HERF: A hybrid energy efficient routing using a fuzzy method in wireless sensor networks,” in Proc. Int. Conf. Intell. Adv. Syst. (ICIAS), Jun. 2010, pp. 1–6. [13] E. H. Mamdani and S. Assilian, “An experiment in linguistic synthesis with a fuzzy logic controller,” Int. J. Man-Mach. Stud., vol. 7, no. 1, pp. 1–13, 1975. [14] K. Akkaya and M. Younis, “A survey on routing protocols for wireless sensor networks,” Ad Hoc Netw., vol. 3, no. 3, pp. 325–349, 2005. [15] P. Nayak, D. Anurag, and V. V. N. A. Bhargavi, “Fuzzy method based super cluster head election for wireless sensor network with mobile base station (FM-SCHM),” in Proc. 2nd Int. Conf. Adv. Comput. Methodol., 2013, pp. 422–427. [16] Y.-C. Wang, F.-J. Wu, and Y.-C. Tseng, “Mobility management algorithms and applications for mobile sensor networks,” Wireless Commun. Mobile Comput., vol. 12, no. 1, pp. 7–21, 2012. [17] M. J. Handy, M. Haase, and D. Timmermann, “Low energy adaptive clustering hierarchy with deterministic cluster-head selection,” in Proc. 4th Int. Workshop Mobile Wireless Commun. Netw., 2002, pp. 368–372.
Padmalaya Nayak (M’15) received the Engineering degree in electronics and telecommunication engineering from the Institution of Electronics and Telecommunication Engineers (IETE), New Delhi, in 1997, the M.E. (Hons.) degree in computer science and engineering from the University of Madras, in 2002, and the Ph.D. degree in computer science and engineering from the National Institute of Engineering Technology, Tiruchirappalli, India, in 2010. She is currently a Professor with the Gokaraju Rangaraju Institute of Engineering Technology under Jawaharlal Nehru Technological University, Hyderabad. She has authored over 25 international conference/journal papers in Ad Hoc and Sensor Networks and two book chapters to her credit. Her current research interest includes ad hoc and sensor networks, cellular communication, and network security. She is the member of the IETE Professional bodies.
Anurag Devulapalli received the bachelor’s degree in information technology from the Gokaraju Rangaraju Institute of Engineering and Technology, Jawaharlal Nehru Technological University, Hyderabad in 2014. He is currently a Software Engineer of an IT firm in Mumbai, India. During his final year of bachelor’s studies, he has authored two research papers under the guidance of Dr. P. Nayak. His research interest includes wireless sensor network and mobile ad hoc networks.